EUVD-2025-21283

| CVE-2025-7548 HIGH
2025-07-13 [email protected]
8.8
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

4
Analysis Generated
Mar 16, 2026 - 09:18 vuln.today
EUVD ID Assigned
Mar 16, 2026 - 09:18 euvd
EUVD-2025-21283
PoC Detected
Jul 15, 2025 - 18:32 vuln.today
Public exploit code
CVE Published
Jul 13, 2025 - 23:15 nvd
HIGH 8.8

Description

A vulnerability has been found in Tenda FH1201 1.2.0.14(408) and classified as critical. This vulnerability affects the function formSafeEmailFilter of the file /goform/SafeEmailFilter. The manipulation of the argument page leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.

Analysis

CVE-2025-7548 is a critical stack-based buffer overflow vulnerability in Tenda FH1201 wireless router firmware version 1.2.0.14(408) affecting the SafeEmailFilter function. An authenticated remote attacker can exploit an improper bounds check on the 'page' parameter to achieve arbitrary code execution with full system privileges (confidentiality, integrity, and availability compromise). Public exploit code exists for this vulnerability, elevating real-world risk significantly.

Technical Context

This vulnerability exists in the formSafeEmailFilter function within the /goform/SafeEmailFilter endpoint of Tenda FH1201 routers. The root cause is CWE-119 (Improper Restriction of Operations within the Bounds of a Memory Buffer), a classic stack-based buffer overflow triggered by insufficient input validation on the 'page' parameter. Tenda routers are embedded Linux-based networking appliances using proprietary web management interfaces; the vulnerable endpoint likely processes form data without proper length validation before copying to stack-allocated buffers. The attack surface is the unauthenticated or authenticated web management interface (typically port 80/443) present on consumer broadband routers used in homes and small offices worldwide.

Affected Products

Tenda FH1201 wireless router, firmware version 1.2.0.14(408). CPE representation: cpe:2.3:o:tenda:fh1201_firmware:1.2.0.14\(408\):*:*:*:*:*:*:*. The FH1201 is a mid-range 802.11ac dual-band router marketed toward home and small business users. The vulnerability likely affects other Tenda firmware versions and potentially related models (FH1202, F3, etc.) if they share the same SafeEmailFilter code, though only version 1.2.0.14(408) is explicitly confirmed as vulnerable.

Remediation

Immediate actions: (1) Tenda must release a patched firmware version addressing the buffer overflow in formSafeEmailFilter function—users should check tenda.com.cn or their regional Tenda support site for firmware updates and apply immediately; (2) Temporary mitigation: disable remote management access to the router's web interface (disable WAN access to port 80/443 in router settings) and restrict management interface access to trusted local networks only; (3) Change default credentials if not already changed; (4) Monitor for suspicious access patterns to /goform/SafeEmailFilter endpoint in router logs. Users should not delay patching given public exploit availability. Network administrators should prioritize Tenda FH1201 devices in patch management workflows.

Priority Score

64
Low Medium High Critical
KEV: 0
EPSS: +0.4
CVSS: +44
POC: +20

Share

EUVD-2025-21283 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy